共 31 条
- [1] Ukil A, Bandyopadhyay S, Pal A., IoT-privacy: To be private or not to be private, Proc. of the 2014 IEEE Conf. on Computer Communications Workshops (INFOCOM WKSHPS), pp. 123-124, (2014)
- [2] Sun RL, Gong JB, Wang R, Zhang L, Cui L., Vehicle identification approach based on DSMT in WSN, Journal of Computer Research and Development, 47, (2010)
- [3] Zhong X., The era of smart media: Privacy, security and ethics of smart homes—Taking EU GDPR and e-PrivacyDirective legislation as examples, TV Research, 340, 3, (2018)
- [4] Sun JG, Wang JX, Yin GS, Wu XL., Overview of network situation awareness technology, Secrecy Science and Technology, 67, 4, (2016)
- [5] Zhao K, Xing YH., Security survey of Internet of things driven by blockchain technology, Netinfo Security, 17, 5, (2017)
- [6] Shen X, Pei QQ, Liu XF., Overview of blockchain technology, Journal of Network and Information Security, 2, 11, (2016)
- [7] Brambilla G, Picone M, Amoretti M, Zanichelli F., An adaptive peer-to-peer overlay scheme for location-based services, Network Computing and Applications (NCA), 2, 1, (2014)
- [8] Wang Y, Han GG, Li HZ., Provable security mobile user key exchange protocol for wireless communications, Netinfo Security, 15, 3, (2015)
- [9] Gross H, Holbl M, Slamanig D., Privacy-aware authentication in the Internet of things, Proc. of the Int’l Conf. on Cryptology and Network Security, pp. 32-39, (2015)
- [10] Skarmeta AF, Hernandez-Ramos JL, Moreno MV., A decentralized approach for security and privacy challenges in the Internet of things, Proc. of the 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 67-72, (2014)